The Tyurin Indictment- Mapping To The Mitre ATT&CK™ Framework

October 9, 2019 Digital Shadows

Director of Security Engineering, Richard Gold, joins Viktoria Austin in this special episode of ShadowTalk to look at the attacker goals, their TTPs, and map this to the Mitre PRE-ATT&CK and ATT&CK framework.

Learn more in Richard Gold’s blog here: https://www.digitalshadows.com/blog-and-research/mapping-the-tyurin-indictment-to-the-mitre-attck-framework/

Some Background…
Between 2012 to mid-2015, U.S. financial institutions, financial services corporations and financial news publishers fell victim to one of the largest computer hacking crimes. The hacking resulted in the theft of information belonging to 100 million customers of the victim companies (including the theft of personal data from 83 million customer accounts at JPMorgan Chase), and securities fraud, in the form of stock market manipulation. While the crimes committed date back to 2015, this week, one of the hackers involved, identified as Andrei Tyurin, pleaded guilty to the following charges:  computer intrusion, wire fraud, bank fraud, and illegal online gambling offenses in connection with his involvement in a massive computer hacking campaign targeting U.S. financial institutions, brokerage firms, financial news publishers, and other American companies. 

Previous Post
ANU Breach Report: Mapping to Mitre ATT&CK Framework
ANU Breach Report: Mapping to Mitre ATT&CK Framework

We decided to map this intrusion to the Mitre ATT&CK framework, as we have done previously for:

Next Post
Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction
Dark Web Overdrive: The Criminal Marketplace Understood Through Cyberpunk Fiction

How can the modern network of .onion marketplaces be understood through novels about a cyberpunk dystopia?...